Shaarli export of all bookmarks on Tue, 31 Oct 17 07:27:22 -0400
- Blade Server Options for VMware vSAN ReadyNode » Blades Made Simple
- What’s new in SSHGuard 2.1 – Ctrl blog
- A Guide to Attacking Domain Trusts – harmj0y
- A Masscan Tutorial and Primer
- The Equifax Breach – A Cyber WTF Moment - Blog | Tenable™
- 5 questions to ask your CEO about cybersecurity | CSO Online
- State-sponsored cyberattacks are now the preferred method of warfare | CSO Online
- When Is Cybersquatting Illegal? - Law and Daily Life
- NAIC Model Law passes | CSO Online
- An AI detected colorectal cancer with 86 percent accuracy
- http://www.itsmf.org.hk/eng/event35/Carl_COBIT_ITIL_for_Change_Mgmt.pdf
- HP lost key historical archives in California's wildfires
- TBS Structured Wiring Jacket Colors
- Where to Put Structured Wiring Wall Jacks
- RJ11 Phone to RJ45 Jack
- How to Declutter Your Home Office – BizSpark Australia
- Personal Countersurveillance (I): Facial Recognition - Security Art Work
- How to debug Windows Crash Dump – BSOD – MILOSZENGEL.com
- IT That Should Just Work: Backup and Restore ESXi Host Configuration
- Melissa Hathaway on The Future of Cybersecurity - Lawfare
- How To Create An Efficient Kanban Board/Process | Purple Gr...
- How to block executables from APPDATA – MILOSZENGEL.com
- VeriSM is it the future of IT Service Managemen | Purple Gr...
- IT That Should Just Work: Windows Server 2016 Licensing Explained
- Difference between antivirus and antimalware - The Silicon Underground
- Intel NIC vs Realtek networking - The Silicon Underground
- IT security hindering productivity and innovation, survey shows
- Depositions Instead of Searching for Responsive Email? – Bow Tie Law
- The Best Meeting Ever » Public Libraries Online
- LEAP#352 Decoding ACARS – tardate 2017
- The QUIC transport protocol: design and Internet-scale deployment | the morning paper
- CIO Dashboard » Top 10 Metrics for a New CIO
- Signature-Based Detection With YARA
- Quick guide to SIAM
- Managing ESXi Firewall with vSphere client, PowerCLI.
- The (Amateur) Data Science Body of Knowledge – Carpe Datum
- The Five Minute* Guide to Machine Learning – Carpe Datum
- The Data Scientist’s Computer – Carpe Datum
- Investigation: WannaCry cyber attack and the NHS
- Investigation: WannaCry cyber attack and the NHS - National Audit Office (NAO)
- Cisco's Talos Intelligence Group Blog: Threat Spotlight: Follow the Bad Rabbit
- Lecture Notes on Cryptography
- Experience SQL Server 2017: Start your journey here – SQL Server According to Bob
- LogFileParser with PowerShell – PowerInTheShell
- MSSQL Penetration Testing with Metasploit
- Microsoft Azure Notebooks - Online Jupyter Notebooks
- Why Only Use One Controller When You Can Use ALL Of Them? | Hackaday
- A Short Guide to Motherboard Parts and Their Functions
- How to Split a Huge CSV Excel Spreadsheet Into Separate Files
- Building a Home Lab for Offensive Security & Security Research · System Overlord
- Detecting Bad Rabbit Ransomware - Blog | Tenable™
- Using chef, terraform and vCenter
- Our 20 most popular pieces of research - 80,000 Hours
- Bad vs. Less Bad Security Reporting: CoreML vs. Ships
- Bad Rabbit ransomware - Securelist
- Canada's 'super secret spy agency' is releasing a malware-fighting tool to the public
- Announcing the vSphere 6.5 Topology and Upgrade Planning Tool - VMware vSphere Blog
- Managing Cyber Security in Today’s Ever-Changing World
- IOActive Labs Research: Embedding Defense in Server-side Applications
- Reaper: Calm Before the IoT Security Storm? — Krebs on Security
- Panama Papers-style leak may follow breach of offshore law firm Appleby
- NBlog - the NoticeBored blog: NBlog October 27 - Equifax cultural issues
- 5 paths to a career in cybersecurity – Naked Security
- Equifax Was Warned - Motherboard
- Comprehensive Guide to Sniffing
- The Price Of Compliance: Study Uncovers GDPR Costs 10/26/2017
- Congressional Committee Wants Nuance to Share NotPetya Details
- Medical Device Security: What Really Works? - HealthcareInfoSecurity
- Cyber Security=Brand ProtectionWebinar. - HealthcareInfoSecurity
- The Equifax Data Breach: A UK Perspective - HealthcareInfoSecurity
- How a Medical Device Vulnerability Can Compromise Privacy
- Why you should care about concurrency – Gabe's Blog
- Download the ISMG Faces of Fraud Industry Survey
- "TorWitness" Docker Container: Automated (Tor) Websites Screenshots - /dev/random
- Why Patching Software Is Hard: Technical Challenges
- Why Patching Software Is Hard: Organizational ...
- BadRabbit ransomware attacks multiple media outlets | CSO Online
- How Sutton’s Law applies to cybersecurity today | CSO Online
- How much will non-compliance with GDPR cost you? | CSO Online
- Measuring cyber resilience – a rising tide raises all ships | CSO Online
- A Checklist for Securing the Internet of Things
- 3 Steps to Reduce Risk in Your Supply Chain
- Navigating the General Data Protection Regulation with data maps | CSO Online
- Insider threats: the 4 vulnerabilities you’re missing | CSO Online
- 3 Must-Haves for IoT Security: Learn, Segment & Protect | CSO Online
- (My) OWASP Belgium Chapter meeting notes | Adventures in the programming jungle
- (My) CSSLP Notes – Secure Software Requirements | Adventures in the programming jungle
- (My) CSSLP Notes – Secure Software Design | Adventures in the programming jungle
- (My) CSSLP Notes – Secure Software Implementation | Adventures in the programming jungle
- (My) CSSLP Notes – Secure Software Testing | Adventures in the programming jungle
- (My) BruCON 2017 Notes (2) | Adventures in the programming jungle
- (My) Brucon 2017 notes (1) | Adventures in the programming jungle
- Sales Tax Rates in Major Cities, Midyear 2017 - Tax Foundation
- Top 5 Tips for Sales Engineers & Seeking Wisdom – Virtually Sober
- For a dollar, an AI will examine your medical scan
- InfluxData (InfluxDB) | Time Series Database Monitoring & Analytics
- General thoughts about patching | rootpool
- Empty homes | rootpool
- Stricter Data Regulation Is on the Way: Are You Ready? -- Virtualization Review
- Ditch Your HDDs For ACloudA Gateway - ESX Virtualization
- Equifax data breach is also being investigated by UK officials
- CSO Online Daily Dashboard | CSO Online
- How to install and use ReaR (Migration & Recovery tool) on CentOS 7 / RHEL 7
- Bad Rabbit Used Pilfered NSA Exploit
- FDA Spells Out When Medical Device Modifications Need Review
- Flashing TM-AC1900 to RT-AC68U ~ Bay Area Tech Pros
- World's Most Common Industrial Control Protocol Dates From 1979
- InfoSec Needs to Embrace New Tech Instead of Ridiculing It
- Ransomware in Healthcare: Time for Vigilance - HealthcareInfoSecurity
- Differences between PSU / BP and RU / RUR
- How to roll your own backup solution with BorgBackup, Rclone, and Wasabi cloud storage | Opensource.com
- Using Cron with EMC VNX and Celerra - THE SAN GUY
- Create Network Diagram from LLDP Neighbor Information « ipSpace.net by @ioshints
- A Sample Makefile for Publishing Blog Articles
- Think Carefully Before Signing Up For a High Deductible Health Plan
- Infrastructure Monitoring with TICK Stack - via @codeship | via @codeship
- Report GPOs with Script References | Alan's Blog
- An Overview of the Security Ecosystem in Programming - via @codeship | via @codeship
- Desired State Configuration(DSC) for SQL Server ***Update 2 – Troy Ault's Blog
- Query Store Best Practices for Mission Critical or Busy SQL Server | Vikas Rana
- The new dynamics of strategy: sense-making in a complex and complicated world | the morning paper
- Seth's Blog: Price vs. cost
- SQL Server 2016 Express SP1 – Always Encrypted – Premier Developer
- KRACK vulnerability breaks encryption over every Wi-Fi networks – Marksei
- Why Setting IT Priorities Is So Important - IT Jungle
- GTD Infographic
- Why Hospitals Need Better Data Science
- More Than Digital Dirt: Preserving Malware in Archives, Museums, and Libraries
- Find native memory leaks in Java
- Shrink VirtualBox VDI files with TRIM | Erik Wramner
- How to create a “heatmap” graph network visualization – David Vassallo's Blog
- What is an Business Continuity Plan? (BCP) | Tom Smyth's Blog
- Why Outsource your Information Technology? | Tom Smyth's Blog
- What is an IT Strategic Plan and what does it contain? | Tom Smyth's Blog
- Responding to KRACK: What You Need To Know - Blog | Tenable™
- Update to Pentest Metasploit Plugin
- Sysinternals Sysmon 6.10 Tracking of Permanent WMI Events
- Basics of Tracking WMI Activity
- Getting Gigabit Networking on a Raspberry Pi 2, 3 and B+ | Jeff Geerling
- 5 steps leaders can take to improve cybersecurity in their organization - TechRepublic
- Virtualization The Future: VMware Certification Tracks Defined
- HIPAA Compliance: Self-Insured Company Reports Breach
- How to install and use Uncomplicated Firewall in Ubuntu - TechRepublic
- Meet Bill Pollock, founder of No Starch Press | Opensource.com
- Install a Centralized Log Server with Rsyslog in Debian 9
- How To Display Date And Time In History Command | 2daygeek.com
- What Next Now the KRACK Smoke is Clearing? - MovingPackets.net
- What Cybersecurity Standard Will a Judge Use in Equifax Breach Suits? - Lawfare
- Cyber Operations and the Draft NDAA: Analyzing Section 1621 (and SecDef's Objections) - Lawfare
- Getting started with Logstash | Opensource.com
- KRACK Vulnerability: What You Need To Know | Electronic Frontier Foundation
- Top 5 cybersecurity facts, figures and statistics for 2017 | CSO Online
- The Costs of Failing to Maintain Important Machinery
- InfoSec Handlers Diary Blog - Baselining Servers to Detect Outliers
- Blood Test Results Exposed in Cloud Repository
- How GDPR is impacting the way privacy is done
- Privacy and security of telehealth must be addressed
- Oracle CPU Preview: What to Expect in the October 2017 Critical Patch Update
- Build it right with NIST’s Cybersecurity Framework | CSO Online
- NICE Cybersecurity Workforce Framework | NIST
- CSO Online Daily Dashboard | CSO Online
- Errata Security: Some notes on the KRACK attack
- RPM Post-Upgrade Scripts · Lindsay Hill
- War Stories: Always Check Your Inputs · Lindsay Hill
- DragonFlyBSD: DragonFly BSD
- Japanese women rank the otaku obsessions they can most forgive in a partner - Japan Today
- Microsoft’s internal bug database was hacked in 2013
- Boost Your Business with These 10 Foods
- Are your employees snooping on your corporate network?
- Understanding AWS Tenancy - The IT Hollow
- KRACK WPA2 Vulnerability Announced - Upgrade Now - MovingPackets.net
- https://blog.scottlowe.org/2017/10/17/rock-stars-builders-janitors/
- default listener port – Laurent Schneider
- Don’t Worry About KRACK - Lawfare
- Project Management Apprenticeships Change the Face of that Career
- 6 hard truths IT must learn to accept | CIO
- Templates - Journals, CVs, Presentations, Reports and More - Overleaf
- Some Tools of a PFE – PowerInTheShell
- 8 Fantastic Facilitation Playbooks for Designing Productive Nonprofit Meetings | Beth's Blog
- JSON Resume
- Top 20 Windows Server Security Hardening Best Practices | securitywing
- OnePlus opens up about its secret data collection and promises an opt-out opportunity
- Intro to Rebuild, a new and open source management framework | Opensource.com
- Microsoft has contractually committed to CJIS regulations in 60% of the United States! – Azure Government Cloud
- 10 bad habits network administrators should avoid at all costs - TechRepublic
- An Introduction to vSphere Security Hardening
- My CompTIA Cloud SME experience – vMusketeers
- HIPAA Security Rule Crosswalk to NIST Cybersecurity Framework
- InfoSec Handlers Diary Blog - It is a resume - Part 1
- The Perfect Meeting Blueprint (Templates Included)
- Global Security Intelligence Report | Microsoft
- Famous malware threats: Where are they now?
- 3 truths for IT leaders navigating intense change | The Enterprisers Project
- Reduce the max cookie lifetime from decades to days in Firefox – Ctrl blog
- RIPE plays with 1.1.1.1 and 1.2.3.4 following APNIC allocation - PacketLife.net
- Army Credentialing Opportunities On-Line Home
- Cybersecurity Canon : Cybersecurity Canon
- Moving from SSAE 16 to SSAE 18: Upcoming Changes to SOC 1 Audits
- Server Room Tour • PC-Addicts
- Hvper – One Page Internet
- From the Canyon Edge: How many people in the world use Ubuntu? More than anyone actually knows!
- What Is CamperForce? Amazon's Nomadic Retiree Army | WIRED
- Major cyber-attack will happen soon, warns UK's security boss | Technology | The Guardian
- Cipherli.st - Strong Ciphers for Apache, nginx and Lighttpd
- SC's Dependency Problems | Management & Mobility content from Windows IT Pro
- User Behavior Analytics | Bottomline Technologies
- Add SSL certificate for RDP sessions — Mapledyne Ideas
- blog.kristinlgriffin.com: Minimum Certificate Requirements for Typical RDS implementation
- SAN Certificates: Subject Alternative Name – Multi-Domain (SAN)
- GitHub - iadgov/Secure-Host-Baseline: Configuration guidance for implementing the Windows 10 and Windows Server 2016 DoD Secure Host Baseline settings. iadgov
- GitHub - EnclaveConsulting/SANS-SEC505: Some of the lab files for the SANS Institute course SEC505: Securing Windows and PowerShell Automation: https://sans.org/sec505
- Removing Self-Signed RDP Certificates | Ask Premier Field Engineering (PFE) Platforms
- Getting In-Control - Combining CobiT® and ITIL® for IT Governance and Process Excellence
- ILSpy is the open-source .NET assembly browser and decompiler.
- What is the AllJoyn Router Service on Windows 10? - 404 Tech Support
- BadNets: Identifying vulnerabilities in the machine learning model supply chain | the morning paper
- Windows Server 2012 R2 stuck in reboot cycle due to failed updates - Oliver MarshallOliver Marshall
- Getting to grips with NFSv4.1 and Kerberos - CormacHogan.com
- How to disable a Wi-Fi card from the command line - Oliver MarshallOliver Marshall
- How to install OpenVAS 9 on Ubuntu 16 LTS - Oliver MarshallOliver Marshall
- How to easily update your VMware Hypervisor from 6.5.x to 6.5 Update 1 Express Patch 04 (ESXi 6.5U1EP04)
- Checking you are up to date with PowerCLI - Virtu-Al.Net
- 6 Steps to Finding Honey in the OWASP - Dark Reading
- 10 Major Cloud Storage Security Slip-Ups (So Far) ...
- Docker compose: what is it? How can you use it? – Marksei
- Listen Notes: Best podcast search engine & podcast database
- Do You Really Need Long-Term-Disability Insurance? : Shots - Health News : NPR
- Equifax Hack Brings Renewed Attention To The Credit Reporting Industry : NPR
- Ben's Laptop Buying Guide | b3n.org
- Download Assistant for RUs, RURs, BPs, PSUs, Patch Sets and Releases
- Barking Up The Wrong Tree: The Benefits of Being Mostly Optimistic
- Digital Identity Guidelines Authentication and Lifecycle Management
- Surviving Fileless Malware: What You Need to Know about Understanding Threat Diversification
- Why Cloud Security Is a Shared Responsibility
- IRS suspends Equifax contract
- Equifax, TransUnion Websites Served Up Adware, Malware
- Equifax breach included 10 million US driving licenses
- RTV (Reddit Terminal Viewer) – A Simple Terminal Viewer For Reddit
- Orgs must demand cyber accountability, Pace University CyberStorm
- Former Congressional IT pro Awan wiped phone before FBI arrest
- Leveraging the Multi-Stakeholder Nature of Cyber Security
- Users aren't the weakest link in cybersecurity: 3 tips for IT leaders - TechRepublic
- CoreOS Controls Multi-Cloud Container Environments via Tectonic 1.7
- Turn Your Ansible Playbook into a Bash Command « ipSpace.net by @ioshints
- Musing: Network Fabrics Of History — EtherealMind
- More Accurate IT Acronyms | The Networking Nerd
- Post Exploitation in VMware Files with Meterpreter
- MS-SQL Penetration Testing lab Setup
- Bill Proposes Medical Device Cyber Framework, Guidelines
- Redefining the Role of HHS CISO - HealthcareInfoSecurity
- GDPR and the Regulatory Impact on Vendor Risk
- Equifax Hackers Stole Info on 693,665 UK Residents — Krebs on Security
- Equifax Credit Assistance Site Served Spyware